Load balancing Omnissa Horizon

Updated on May 12, 2026
Published on March 8, 2023

Benefits of load balancing Omnissa Horizon (formerly VMware Horizon)

Load balancing Omnissa Horizon provides the following key benefits:

  • High Availability (HA): This is arguably the most crucial benefit. By distributing client connections across multiple Connection Server or UAG instances, the failure of one server does not take the entire service offline. A load balancer constantly monitors the “health” of each server. If a server fails its health check, the load balancer instantly stops sending new user traffic to it, ensuring users are always directed to a working component. IT administrators can take a server offline (quiesce it) for patching, upgrades, or maintenance without impacting active user sessions or preventing new users from logging in, significantly improving operational flexibility.
  • Scalability and performance: Load balancing allows you to easily scale your environment and ensures a consistent user experience. It intelligently distributes incoming user connection requests (for authentication and session brokering) across all available servers. This prevents any single server from becoming overloaded, which is essential for maintaining fast log-in times and preventing slow performance. As your organization grows or user demand spikes, you can simply add more Connection Servers or UAG appliances to the load-balanced pool to handle the increased load. The load balancer automatically incorporates them, allowing the environment to scale horizontally without complex reconfiguration.
  • Simplified access and user experience: Load balancing provides a streamlined and consistent front-end for users. Instead of having users connect to a specific server’s name (e.g., server01.company.com), the load balancer presents a single, easy-to-remember Virtual IP (VIP) address or fully qualified domain name (FQDN) (e.g., vdi.company.com). Users only need to know this one public address, whether they are connecting internally or externally (via UAGs). The load balancer handles the complexity of routing the traffic to the correct backend server. For Horizon’s multi-protocol connections, the load balancer uses features like Source IP Affinity to ensure that all subsequent connection requests from a single user are directed back to the same Connection Server or UAG instance that initially authenticated them, which is vital for a smooth and uninterrupted user session.

About Omnissa Horizon

Omnissa Horizon (formerly known as VMware Horizon) is a commercial desktop and application virtualization product. It was developed by VMware and is now a core product of Omnissa, a company that was formed from the End-User Computing division of VMware after its acquisition by Broadcom.

It allows businesses to deliver virtual desktops and applications to users from a central location, whether on-premises or in the cloud. This means that instead of running software and an operating system directly on a user’s computer, those resources are hosted in a data center and streamed to the user’s device.

While the application name has changed, the product itself is a continuation of the Horizon 8 line. Any version of Horizon 8 that was released after the rebrand is now officially known as Omnissa Horizon.

Why Loadbalancer.org for Omnissa Horizon?

Loadbalancer’s intuitive Enterprise Application Delivery Controller (ADC) is designed to save time and money with a clever, not complex, WebUI. 

Easily configure, deploy, manage, and maintain our Enterprise load balancer, reducing complexity and the risk of human error. For a difference you can see in just minutes.

And with WAF and GSLB included straight out-of-the-box, there’s no hidden costs, so the prices you see on our website are fully transparent. 

More on what’s possible with Loadbalancer.org.

How to load balance Omnissa Horizon

Connection Servers broker client connections, authenticate users, and direct incoming requests to the correct endpoint. Although the Connection Server helps form the connection, it typically does not act as part of the data path after the connection is established.

Security Servers are installed in the DMZ and add an additional layer of security between the Internet and the internal network for external users. Each Security Server must be paired with a Connection Server and forwards all traffic to that instance. This pairing requires the Connection Server to be in tunnel mode, which means it is not suitable for internal client connections, so two sets of Connection Servers are needed – one to handle connections from the paired Security Servers, the other to handle internal clients.

Access Point is a hardened SUSE Linux based appliance introduced in v6.2 as an alternatively to Security Server. Access Point was renamed Unified Access Gateway (UAG) in Horizon v7.0. UAG is now the preferred option over Security Server. Access Point / UAG is not paired, so only one set of Connection Servers is needed for both external and internal clients.

For high availability and scalability, VMware recommended that multiple Connection Servers and multiple Unified Access Gateways were deployed in a load-balanced cluster.

The load balancers can be configured in various ways to support internal and external clients as detailed in the deployment guides referenced below.

Ports used by the appliance

ProtocolPortPurpose
TCP22SSH
TCP/UDP53GSLB
TCP/UDP123NTP
TCP/UDP161SNMP
UDP6694Heartbeat between Primary & Secondary appliances in HA mode
TCP7778HAProxy persistence table replication
TCP9000Gateway service for ADC Portal comms
TCP9080WebUI – HTTP (disabled by default)
TCP9081Nginx fallback server
TCP9443WebUI – HTTPS
TCP25565Shuttle service for ADC Portal comms

Note

All ports listed above except port 123 (NTP) can be changed if required.

External clients

There are three different ways to configure the external clients:

  • Option 1: The load balancer uses a single VIP configured with source IP address persistence to load balance the primary protocol to one of the UAGs. The client connection URLs on each UAG are configured so that secondary protocols are also sent to the VIP for load balancing to the same UAG. This option is recommended for all environments where source IP address persistence is possible. Where it’s not possible (typically due to in-line NAT devices hiding client source IP addresses), then either option 2 or option 3 should be used.
  • Option 2: The load balancer uses a single VIP configured with either source IP address or cookie persistence to load balance the primary protocol to one of the UAGs. The client connection URLs on each UAG are configured so that secondary protocols are sent directly to the same UAG, bypassing the load balancer.
  • Option 3: The load balancer uses one VIP configured with either source IP address or cookie persistence to load balance the primary protocol to one of the UAGs. The client connection URLs on each UAG are configured so that secondary protocols are sent to the same UAG via additional VIPs on unique port numbers.

Internal clients

Internal clients connect to the Connection Server VIP on the LAN. Secondary protocols go direct to the virtual desktops unless Connection Server gateways are explicitly enabled.

Only the primary protocol is load balanced, secondary protocols go direct to the virtual desktops.

Load balancing deployment concept

DC VMware Horizon, Network Diagram, Loadbalancer.org